Session ID Hijacking With Burp Suite | OverTheWire Natas Level 20
We covered OverTheWire Natas 19-20 level. In this level, the web application used an if statement to…
We covered OverTheWire Natas 19-20 level. In this level, the web application used an if statement to…
We covered OverTheWire Natas 19-20 level. This level was similar to the previous level but with the…
We used Burp Suite to demonstrate an experiment on enumerating sessions IDs created using PHP language. The…
We covered time based SQL injection using the sleep function. Time time based SQL injection relies in…
We covered OverTheWire Natas Level 16 CTF where we went over a blind SQL injection scenario that…
We covered a scenario of blind SQL Injection where the web application accepts user input without sanitization…
We covered a scenario of a login form vulnerable to SQL injection vulnerability. The source code allowed…
We covered Command Injection & SQL Injection which are in the OWASP TOP 10 list of vulnerabilities….
We covered broken authentication, session hijacking and information disclosure as part of HTB OWASP TOP 10 track…
We covered a simple demonstration of XML External Entity Injection vulnerability which is part of OWASP Top…
We covered Fuzzing Web Applications with Wfuzz specifically fuzzing API endpoints. This was part of HackTheBox OWASP…
We covered python pickle where we demonstrated the serialization and deserialization of python pickle objects. This was…
We covered basic white box penetration test by inspecting, analyzing and exploiting a web application source code…
RedCross From HackTheBox was like a maze, with several different paths to achieve shell and root. We’ll…
We covered another file upload vulnerability where the vulnerable code contained a PHP function exif_imagetype to check…
We covered a basic example of bypassing file upload filters by changing the extension. We used Burp…
We covered a scenario of web application admin bypass by reverse engineering the PHP source code which…
Introduction We covered broken authentication and SQL injection walkthrough as part of OWASP Juice Shop from TryHackMe….
Introduction We performed an Nmap scanning to enumerate open ports and we discovered an HTTP service which…
Summary In this video walk-through, we demonstrated gaining root access to a docker container running a web…